Skip to main content
Log in

On the security and robustness of “Keyless dynamic optimal multi-bit image steganography using energetic pixels”

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The multi-bit image steganography (Paul et al. Multimedia Tools and Applications 76(5):7445–7471, 2017) proposed by Paul et al. provides high embedding capacity, and adapts the embedding position of messages to image content. This paper investigates the security and robustness of multi-bit steganography. In detection resistant experiment, we embed secret messages into cover images with multi-bit image steganography to get corresponding stego images, and adopt a more popular steganalyzer (SRM) to extract features of cover images and stego images. The ensemble classifier is trained with default settings. The experimental results show detection resistance performance of multi-bit image steganography is poor. In robustness test, we embed secret messages into cover images with multi-bit image steganography to get stego images, and attack the stego images with Stirmark. Then, we extract the secret messages from the attacked stego images. The experimental results demonstrate that we can not recover the secret messages from the attacked stego images. Therefore, there are flaws in detection resistant test and robustness test of multi-bit image steganography.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Andreas W, Pfitzmann A (1999) Attacks on steganographic systems. In: International workshop on information hiding, pp 61–76

  2. Bas P, Filler T, Pevny T (2011) Break our steganographic system the ins and outs of organizing boss. In: International workshop on information hiding, pp 59–70

  3. Fei P et al (2019) A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multimedia Tools and Applications 78(19):26885–26905

    Article  Google Scholar 

  4. Fei P et al (2020) Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting. Signal Process Image Commun 81:115715

    Article  Google Scholar 

  5. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International workshop on information forensics and security, pp 234–239

  6. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security 2014(1):1–13

    Article  Google Scholar 

  7. Huang H-C, Chang F-C (2016) Multi-Tier And Multi-Bit reversible data hiding with contents characteristics. Journal of Information Hiding and Multimedia Signal Processing 7(1):11–20

    Google Scholar 

  8. Huang H-C, Chang F-C, Yuh-Yih L (2017) Multi-Bit Reversible data hiding with prediction and difference alteration. Journal of Information Hiding and Multimedia Signal Processing 8(2):435–444

    Google Scholar 

  9. Jessica F, Goljan M, Rui D (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security: new challenges, pp 27–30

  10. Jessica F, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3):868–882

    Article  Google Scholar 

  11. Jia D et al (2009) Imagenet: A large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, pp 248–255

  12. Jumanto J (2018) An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection. Cybern Inform Technol 18(2):74–88

    Google Scholar 

  13. Ki-Hyun J, Yoo K-Y (2015) Steganographic method based on interpolation and LSB substitution of digital images. Multimedia Tools and Applications 74 (6):2143–2155

    Article  Google Scholar 

  14. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forensics and Security 7(2):432–444

    Article  Google Scholar 

  15. Paul G, Davidson I, Mukherjee I, Ravi SS (2012) Keyless steganography in spatial domain using energetic pixels. In: International conference on information systems security, pp 134–148

  16. Paul G, Davidson I, Mukherjee I, et al. (2017) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimedia Tools and Applications 76(5):7445–7471

    Article  Google Scholar 

  17. Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International workshop on information hiding, pp 161–177

  18. Pragya G, Bhagat J (2019) Image steganography using LSB substitution facilitated by shared password. In: International conference on innovative computing and communications. Springer, Singapore, pp 369–376

  19. Rafael T, Madeiro F (2016) Word-Hunt: A LSB steganography method with low expected number of modifications per pixel. IEEE Latin America Trans 14(2):1058–1064

    Article  Google Scholar 

  20. Rengarajan A, Rayappan JBB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inform Sci 193:115–124

    Article  Google Scholar 

  21. Sarreshtedari S, Akhaee MA (2013) One-third probability embedding: a new± 1 histogram compensating image least significant bit steganography scheme. IET image Process 8(2):78–89

    Article  Google Scholar 

  22. Swain G (2019) Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arabian J Sci Eng 44(4):2995–3004

    Article  Google Scholar 

  23. Yang H, Sun X, Sun G (2009) A high-capacity image data hiding scheme using adaptive LSB substitution. Radio Eng 18(4):509–516

    Google Scholar 

  24. Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security 12 (11):2545–2557

    Article  Google Scholar 

  25. Zhang X, Yin Z (2017) Data hiding in multimedia. Chinese Journal of Nature 39(2):87–95

    Google Scholar 

  26. Zhi-Hui W, Chang C-C, Li M-C (2012) Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf Sci 192:98–108

    Article  Google Scholar 

Download references

Acknowledgements

This research work is partly supported by National Natural Science Foundation of China (61872003, U1636206,61860206004).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhaoxia Yin.

Ethics declarations

Conflict of interests

None

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ke, L., Yin, Z. On the security and robustness of “Keyless dynamic optimal multi-bit image steganography using energetic pixels”. Multimed Tools Appl 80, 3997–4005 (2021). https://doi.org/10.1007/s11042-020-09807-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09807-4

Keywords

Navigation